The identities that we rely on to authenticate and authorize
users, services, and systems are a critical layer in a defense-indepth architecture. This chapter explains identity,
authentication, and authorization concepts and systems. You
will learn about the major threats to identity and identity
systems as well as how to use identity as a defensive layer.